cpe:/a:symantec:veritas_storage_foundation:5.0::aix cpe:/a:symantec:veritas_storage_foundation:5.0::hp_ux cpe:/a:symantec:veritas_storage_foundation:5.0::linux cpe:/a:symantec:veritas_storage_foundation:5.0::solaris cpe:/a:symantec:veritas_storage_foundation:5.0::windows_2000 cpe:/a:symantec:veritas_storage_foundation:5.0:32bit:windows_2003 cpe:/a:symantec:veritas_storage_foundation:5.0:64bit:windows_2003 CVE-2008-0638 2008-02-21T15:44:00.000-05:00 2008-09-05T17:35:36.243-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2008-02-22T12:40:00.000-05:00 ALLOWS_ADMIN_ACCESS SECTRACK 1019459 BUGTRAQ 20080220 ZDI-08-007: Symantec VERITAS Storage Foundation Administrator Service Heap Overflow Vulnerability BID 25778 SECUNIA 29050 CONFIRM http://www.symantec.com/avcenter/security/Content/2008.02.20a.html MISC http://www.zerodayinitiative.com/advisories/ZDI-08-007.html Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.